36,718 Results for:

  • Sort by: 

Security, business agility kindle network automation adoption

09 Oct 2019

IT teams are confused by the multiple automation strategies available, but they're still adopting automation with hopes it will benefit network security and agility. Read More

US may cut off countries that use Huawei in 5G networks

22 Feb 2019

US secretary of state Mike Pompeo has said America may scale back or cut military and diplomatic ties with countries that use Huawei equipment in national 5G networks Read More

Procurement zones become telecom network infrastructure strategy

17 Sep 2009

Telecom carriers are changing their traditional network technology procurement procedures and looking at vendor-led "procurement zones" to ensure equipment and solutions interoperability and get around delayed ... Read More

PM May approves Huawei for use in 5G networks despite opposition

24 Apr 2019

The UK’s National Security Council has approved the use of Huawei’s networking equipment in parts of the country’s 5G mobile networks in spite of widespread opposition Read More

Cumulus NetQ aimed at broader enterprise market

23 Apr 2019

Cumulus Networks has revamped Cumulus NetQ. The latest version of the network troubleshooting and change validation software is aimed at a larger segment of the enterprise market. Read More

Building the network infrastructure in your data center

25 Feb 2009

The network architect must help contribute to an energy-efficient and cost-effective data center network design -- without sacrificing performance. This can be accomplished by choosing optimal networking equipment.... Read More

New market pressures mold broadband access network infrastructure

26 Feb 2010

When it comes to broadband access network infrastructure upgrades, telecom carriers face high capital expense costs and subscriber reluctance to pay the real price for one big pipe to deliver everything. Find out ... Read More

National Trust for Scotland overcomes legacy network challenge

25 Nov 2014

The National Trust for Scotland has replaced a historical network infrastructure with a core service from Brocade Read More

Layered security approach can thwart VoIP attacks

08 Jul 2015

A strategically placed firewall within your network infrastructure can help mitigate VoIP attacks. But encryption and proxy services add enhanced security. Read More

Five ways a managed print service can support cyber resilience

04 Oct 2019

As IoT devices, smart MFPs are susceptible to the growing threat of attempts to implant malware, recruit to botnets (to help perpetrate DDoS attacks), as well as potentially providing an open ... Read More